Re: [decade] Review of draft-ietf-decade-reqs-08

Songhaibin <haibin.song@huawei.com> Mon, 10 September 2012 08:26 UTC

Return-Path: <haibin.song@huawei.com>
X-Original-To: decade@ietfa.amsl.com
Delivered-To: decade@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DB5E421F850D for <decade@ietfa.amsl.com>; Mon, 10 Sep 2012 01:26:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.629
X-Spam-Level:
X-Spam-Status: No, score=-3.629 tagged_above=-999 required=5 tests=[AWL=0.329, BAYES_40=-0.185, RCVD_IN_DNSWL_MED=-4, SARE_SUB_OBFU_Q1=0.227]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E-cJqlX30Q-U for <decade@ietfa.amsl.com>; Mon, 10 Sep 2012 01:26:57 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) by ietfa.amsl.com (Postfix) with ESMTP id E2E3721F8501 for <decade@ietf.org>; Mon, 10 Sep 2012 01:26:48 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml203-edg.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.5-GA FastPath queued) with ESMTP id AJM92027; Mon, 10 Sep 2012 08:26:47 +0000 (GMT)
Received: from LHREML406-HUB.china.huawei.com (10.201.5.243) by lhreml203-edg.huawei.com (172.18.7.221) with Microsoft SMTP Server (TLS) id 14.1.323.3; Mon, 10 Sep 2012 09:26:37 +0100
Received: from SZXEML427-HUB.china.huawei.com (10.72.61.35) by lhreml406-hub.china.huawei.com (10.201.5.243) with Microsoft SMTP Server (TLS) id 14.1.323.3; Mon, 10 Sep 2012 09:26:41 +0100
Received: from SZXEML534-MBX.china.huawei.com ([169.254.2.70]) by szxeml427-hub.china.huawei.com ([10.72.61.35]) with mapi id 14.01.0323.003; Mon, 10 Sep 2012 16:26:29 +0800
From: Songhaibin <haibin.song@huawei.com>
To: Konstantinos Pentikousis <k.pentikousis@huawei.com>, "Rahman, Akbar" <Akbar.Rahman@InterDigital.com>
Thread-Topic: Review of draft-ietf-decade-reqs-08
Thread-Index: AQHNek8zSOtXNshZRkafaYo+6v08l5ddw0pwgBaNv4CABJpuYIAKckBA
Date: Mon, 10 Sep 2012 08:26:29 +0000
Message-ID: <E33E01DFD5BEA24B9F3F18671078951F23B2E106@szxeml534-mbx.china.huawei.com>
References: <20120813195006.29392.94335.idtracker@ietfa.amsl.com> <8D38716F0C1A444BA0CD7E96454366C23A4C5095@szxeml545-mbs.china.huawei.com> <D60519DB022FFA48974A25955FFEC08C04A78814@SAM.InterDigital.com> <8D38716F0C1A444BA0CD7E96454366C23A4D82BF@szxeml545-mbx.china.huawei.com>
In-Reply-To: <8D38716F0C1A444BA0CD7E96454366C23A4D82BF@szxeml545-mbx.china.huawei.com>
Accept-Language: en-US, zh-CN
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.138.41.123]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Cc: "decade@ietf.org" <decade@ietf.org>
Subject: Re: [decade] Review of draft-ietf-decade-reqs-08
X-BeenThere: decade@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "To start the discussion on DECoupled Application Data Enroute, to discuss the in-network data storage for p2p applications and its access protocol" <decade.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/decade>, <mailto:decade-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/decade>
List-Post: <mailto:decade@ietf.org>
List-Help: <mailto:decade-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/decade>, <mailto:decade-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Sep 2012 08:26:58 -0000

Hi Kostas and Akbar,

Thank you for the good comments and discussion.

> -----Original Message-----
> From: decade-bounces@ietf.org [mailto:decade-bounces@ietf.org] On Behalf Of
> Konstantinos Pentikousis
> Sent: Tuesday, September 04, 2012 12:43 AM
> To: Rahman, Akbar
> Cc: decade@ietf.org
> Subject: Re: [decade] Review of draft-ietf-decade-reqs-08
> 
> Hi Akbar,
> 
>   |Thanks, your comments and analysis are always very thought provoking!
> 
> Thank you for your kind words.
> 
> <snip>
> 
>   |In a DECADE system, efficient storage and data transfer of small data
>   |objects is required [5.3].
>   |
>   |[AKBAR] AND WE SHOULD ADD THE PHRASE "... AND DATA TRANSFER OF
> LARGE
>   |DATA OBJECTS IS ALSO INHERENTLY SUPPORTED."
> 
> Sure, I guess this goes into the text of [5.3] then.
> 
> 
>   |The data transport protocol can be negotiated but must be secure [7.1,
>   |7.3].
>   |
>   |
>   |[AKBAR] AND I WOULD ADD TWO MORE POINTS APPLICABLE TO THE NEXT
>   |PARAGRAPH:
>   |- ALL CONTROL FUNCTIONS ARE ACCOMPLISHED USING THE DECADE
> RESOURCE
>   |PROTOCOL (DRP)
> 
> I understand what you have in mind, but it will be a bit strange to put, let me call
> it, a "forward reference" to a protocol that does not exist. Just my $0.02.

As long as the explanation for DRP exists in the document, I do not think this is a problem.

-Haibin

> 
>   |Security is based on cryptographic methods which allow a DECADE
>   |provider to access system resources, distribute content to content
>   |consumers of its choosing, even when offline, using (if needed) fine-
>   |grained access control policies [6.2, 6.3, 6.4, 6.5, 6.6, 8.2, 8.3].
>   |Client data on a server are by default private [6.7]. It is the client
>   |that always discovers and initiates a connection to a server [6.8,
>   |6.9], not vice versa. Data objects can be written by a provider in one
>   |go or several rounds and can be read by multiple consumers
>   |simultaneously [7.2, 7.4]. Every provider is given the means to obtain
>   |resource usage stats and quotas [10.1]. Overall, attack mitigation is
>   |a MUST [9.5] and transport redirection SHOULD be supported [7.7]
>   |
>   |[AKBAR] IN THE EXPLANATION YOU SWITCH TERMS BETWEEN "PROVIDER"
> AND
>   |"CLIENT".  IT WOULD BE CLEARER I THINK IF YOU STUCK TO JUST "PROVIDER"
>   |AND "CONSUMER".
> 
> Well, I agree that a few terms in sec 2.* have some overlap and perhaps could be
> simplified a bit, but I tried to have the cheat sheet summary as close as possible
> to the definitions in Sec 2.* and the -reqs text. For example, in 6.7 (copy and
> paste):
> 
> REQUIREMENT(S): Unless read or write access is granted by a Provider, the
> default permission MUST be no access.
> RATIONALE: This requirement is to protect client privacy by default.
> 
> I guess that means s/client/provider in the rationale part, and the cheat sheet
> summary becomes "Provider data on a server are by default private [6.7]"
> 
> On the other hand, in the sentence "It is the client... [6.8, 6.9]", "client" (as per
> sec. 2.1) is the right term, not "provider".
> 
> Best regards,
> 
> Kostas